]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/test/test-rm-rf.c
6a8b7d823fb3bd11f2b9f1eadd78e66f31cddad0
[thirdparty/systemd.git] / src / test / test-rm-rf.c
1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
2
3 #include <unistd.h>
4
5 #include "alloc-util.h"
6 #include "process-util.h"
7 #include "rm-rf.h"
8 #include "string-util.h"
9 #include "tests.h"
10 #include "tmpfile-util.h"
11
12 static void test_rm_rf_chmod_inner(void) {
13 _cleanup_(rm_rf_physical_and_freep) char *d = NULL;
14 const char *a, *b, *x, *y;
15 struct stat st;
16
17 assert_se(getuid() != 0);
18
19 assert_se(mkdtemp_malloc("/tmp/test-rm-rf.XXXXXXX", &d) >= 0);
20 a = strjoina(d, "/a");
21 b = strjoina(a, "/b");
22 x = strjoina(d, "/x");
23 y = strjoina(x, "/y");
24
25 assert_se(mkdir(x, 0700) >= 0);
26 assert_se(mknod(y, S_IFREG | 0600, 0) >= 0);
27
28 assert_se(chmod(y, 0400) >= 0);
29 assert_se(chmod(x, 0500) >= 0);
30 assert_se(chmod(d, 0500) >= 0);
31
32 assert_se(rm_rf(d, REMOVE_PHYSICAL) == -EACCES);
33
34 assert_se(access(d, F_OK) >= 0);
35 assert_se(access(x, F_OK) >= 0);
36 assert_se(access(y, F_OK) >= 0);
37
38 assert_se(rm_rf(d, REMOVE_PHYSICAL|REMOVE_CHMOD) >= 0);
39
40 assert_se(access(d, F_OK) >= 0);
41 assert_se(access(x, F_OK) < 0 && errno == ENOENT);
42 assert_se(access(y, F_OK) < 0 && errno == ENOENT);
43
44 assert_se(mkdir(a, 0700) >= 0);
45 assert_se(mkdir(b, 0700) >= 0);
46 assert_se(mkdir(x, 0700) >= 0);
47 assert_se(mknod(y, S_IFREG | 0600, 0) >= 0);
48
49 assert_se(chmod(b, 0000) >= 0);
50 assert_se(chmod(a, 0000) >= 0);
51 assert_se(chmod(y, 0000) >= 0);
52 assert_se(chmod(x, 0000) >= 0);
53 assert_se(chmod(d, 0500) >= 0);
54
55 assert_se(rm_rf(d, REMOVE_PHYSICAL|REMOVE_CHMOD|REMOVE_CHMOD_RESTORE|REMOVE_ONLY_DIRECTORIES) == -ENOTEMPTY);
56
57 assert_se(access(a, F_OK) < 0 && errno == ENOENT);
58 assert_se(access(d, F_OK) >= 0);
59 assert_se(stat(d, &st) >= 0 && (st.st_mode & 07777) == 0500);
60 assert_se(access(x, F_OK) >= 0);
61 assert_se(stat(x, &st) >= 0 && (st.st_mode & 07777) == 0000);
62 assert_se(chmod(x, 0700) >= 0);
63 assert_se(access(y, F_OK) >= 0);
64 assert_se(stat(y, &st) >= 0 && (st.st_mode & 07777) == 0000);
65
66 assert_se(chmod(y, 0000) >= 0);
67 assert_se(chmod(x, 0000) >= 0);
68 assert_se(chmod(d, 0000) >= 0);
69
70 assert_se(rm_rf(d, REMOVE_PHYSICAL|REMOVE_CHMOD|REMOVE_CHMOD_RESTORE) >= 0);
71
72 assert_se(stat(d, &st) >= 0 && (st.st_mode & 07777) == 0000);
73 assert_se(access(d, F_OK) >= 0);
74 assert_se(chmod(d, 0700) >= 0);
75 assert_se(access(x, F_OK) < 0 && errno == ENOENT);
76
77 assert_se(mkdir(x, 0700) >= 0);
78 assert_se(mknod(y, S_IFREG | 0600, 0) >= 0);
79
80 assert_se(chmod(y, 0000) >= 0);
81 assert_se(chmod(x, 0000) >= 0);
82 assert_se(chmod(d, 0000) >= 0);
83
84 assert_se(rm_rf(d, REMOVE_PHYSICAL|REMOVE_CHMOD|REMOVE_ROOT) >= 0);
85
86 assert_se(access(d, F_OK) < 0 && errno == ENOENT);
87 }
88
89 TEST(rm_rf_chmod) {
90 int r;
91
92 if (getuid() == 0) {
93 /* This test only works unpriv (as only then the access mask for the owning user matters),
94 * hence drop privs here */
95
96 r = safe_fork("(setresuid)", FORK_DEATHSIG|FORK_WAIT, NULL);
97 assert_se(r >= 0);
98
99 if (r == 0) {
100 /* child */
101
102 assert_se(setresuid(1, 1, 1) >= 0);
103
104 test_rm_rf_chmod_inner();
105 _exit(EXIT_SUCCESS);
106 }
107
108 return;
109 }
110
111 test_rm_rf_chmod_inner();
112 }
113
114 DEFINE_TEST_MAIN(LOG_DEBUG);